Issued Patents All Time
Showing 25 most recent of 34 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12192326 | System and method of multi-party computation based multi-factor authentication | Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar, Alexander Manuskin, Oded Leiba | 2025-01-07 |
| 11930110 | System and method for key recovery and verification in blockchain based networks | Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar | 2024-03-12 |
| 11818228 | Establishing user's presence on internal on-premises network over time using network signals | Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman, Michael Dubinsky +1 more | 2023-11-14 |
| 11616854 | System and method of secured interface to a blockchain based network | Menahem CHERBAKOVSKY | 2023-03-28 |
| 11616643 | System and method of management of a shared cryptographic account | Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar | 2023-03-28 |
| 11539510 | System and method of cryptographic key management in a plurality of blockchain based computer networks | Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar | 2022-12-27 |
| 11063960 | Automatic generation of attribute values for rules of a web application layer attack detector | Shelly Hershkovitz, Nitzan Niv, Amichai Shulman | 2021-07-13 |
| 11050786 | Coordinated detection and differentiation of denial of service attacks | Amichai Shulman | 2021-06-29 |
| 11025668 | Detecting attacks using compromised credentials via internal network monitoring | Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik | 2021-06-01 |
| 10915622 | Detecting local user security-related anomalies using active scans | Marina Simakov, Itai Grady Ashkenazy, Chaim Menachem Hoch, Tal Joseph Maor | 2021-02-09 |
| 10623234 | Managing alerts regarding additions to user groups | Sivan Krigsman, Itai Grady, Yaron Kaner, Amit Rosenzweig, Tom Jurgenson | 2020-04-14 |
| 10609048 | Systems and methods for the detection of advanced attackers using client side honeytokens | Itai Grady | 2020-03-31 |
| 10511599 | System to filter impossible user travel indicators | Ami Luttwak | 2019-12-17 |
| 10505894 | Active and passive method to perform IP to name resolution in organizational environments | Idan Plotnik, Sivan Krigsman, Benny Lakunishok, Michael Dubinsky, Michael Dolinsky | 2019-12-10 |
| 10404742 | Coordinated detection and differentiation of denial of service attacks | Amichai Shulman | 2019-09-03 |
| 10333944 | Detecting impossible travel in the on-premise settings | Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Idan Plotnik, Gil David | 2019-06-25 |
| 10298699 | Physical location determination of internal network components | Tom Jurgenson, Idan Plotnik, Michael Dubinsky, Sivan Krigsman, Gil David | 2019-05-21 |
| 10148639 | Distinguishing vertical brute force attacks from benign errors | Idan Plotnik, Michael Dolinsky, Sivan Krigsman, Gil David, Marina Simakov | 2018-12-04 |
| 10129298 | Detecting attacks using compromised credentials via internal network monitoring | Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik | 2018-11-13 |
| 10063571 | Systems and methods for the detection of advanced attackers using client side honeytokens | Itai Grady | 2018-08-28 |
| 9860260 | Monitoring the life cycle of a computer network connection | Itai Grady, Idan Plotnik | 2018-01-02 |
| 9762592 | Automatic generation of attribute values for rules of a web application layer attack detector | Shelly Hershkovitz, Nitzan Niv, Amichai Shulman | 2017-09-12 |
| 9729538 | System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization | Idan Plotnik, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman | 2017-08-08 |
| 9614861 | Monitoring the life cycle of a computer network connection | Itai Grady, Idan Plotnik | 2017-04-04 |
| 9485264 | Coordinated detection and differentiation of denial of service attacks | Amichai Shulman | 2016-11-01 |